Useful Idiots: Glenn Greenwald on Reality Winner Controversy and Asking Trump to Pardon Snowden – Rolling Stone

In this weeks quarantine episode of our Useful Idiotspodcast, hostsMatt Taibbi and Katie Halper are joined by Glenn Greenwald of The Intercept, who has yet again found himself in the middle of some media controversies.

For Democrats suck, Katie breaks down the recent viral Joe Biden clip, in which Biden plays Despacito from his phone at a rally during Hispanic Heritage Month. Thats what we call Hispandering, says Katie, who translates the sensual lyrics of the song into English for our listeners.

Katie also gets fired up about a recent proposition on MSNBC that Bidens association with Bernie may be hurting him with Cuban-American voters in Florida. Im just so tired of people using the Cuban-American demographic as interchangeable with Latino, says Katie. [Bernie] did really well with Latinos.

If [Democrats are] going to turn around and blame Sanders if-and-when they have a problem in Florida coming up in November, thats going to be really rich, because they were the ones who made a huge deal of this last year, says Matt.

Matt and Katie also return to their theme of neighborly conflict, citing an article from The Mirror about an angry letter that was sent to a homeowner whod recently painted their garage. God, I love human beings, Matt quips.

Glenn Greenwald once again joins our hosts from Brazil to discuss debates about him and his colleagues in the media.

Greenwald rebuts Ben Smiths recent New York Times piece on The Intercept publishing the Reality Winner leak. It wasnt like The Intercept was free from mistakes, there were mistakes made, and they acknowledged those mistakes. The parent company paid for the sources, Reality Winners, legal defense, says Greenwald. I just dont know what this New York Times article added other than to try and just take shots at people incoherently.

Greenwald also charges that in many stories that hes appeared in, the journalists writing them have passed off hypotheses as facts, when Greenwald says many of those things are categorically untrue. I would be present for events, or conversations, or things that people did, and then I would read in a major news outlet in a very authoritative tone, describing something that I knew first-hand was completely false, says Greenwald. Youre listening to the most trusted and influential media outlets saying things that you know personally didnt happen, are totally false, over and over and over again Theres nothing like being at the center of a story to make you realize just what a disinformation machine it is.

Our hosts and Greenwald discuss questions surrounding the Assange hearing, which Greenwald describes as the one true assault on free press that has been pursued during Trumps tenure.

And finally, Greenwald explains his motivation for, once again, recently appearing on Tucker Carlsons show on Fox News, in which he made an appeal to Trump to pardon both Edward Snowden and Julian Assange. I also know that going on Fox, the shows that Trump watches is a really effective way of speaking directly to the one person who holds the power of the pardon, and thats the president, says Greenwald. I think its my ethical duty to do what I can to end injustices in the world, such as the injustice of Edward Snowden being trapped in one country for having exposed things that Americans have the right to know, and the injustice of Julian Assange being prosecuted and and extradited to the United States on espionage charges for revealing war crimes about the United States. So when someone offers me the opportunity to end an injustice, and make the world more just, Im going to do that. And its not even a close debate for me. I care a lot more about outcomes, about actually having my beliefs manifest as change in the world, than I care about preening and posturing for the approval of LARPing online liberals.

See original here:
Useful Idiots: Glenn Greenwald on Reality Winner Controversy and Asking Trump to Pardon Snowden - Rolling Stone

We face deadly threats that would make the coronavirus seem minor | TheHill – The Hill

Threats to national security and prosperity have risen, both at home and abroad, in the years since 9/11, the deadliest ever terrorist attacks on the United States. Although critics are reluctant to admit it, President TrumpDonald John TrumpUS reimposes UN sanctions on Iran amid increasing tensions Jeff Flake: Republicans 'should hold the same position' on SCOTUS vacancy as 2016 Trump supporters chant 'Fill that seat' at North Carolina rally MORE has addressed some of these well. Cracking down on China, for instance, was long overdue. So was killing two jihadi leaders who were responsible for the deaths of hundreds of Americans in the Middle East.

Persuading the United Arab Emirates and Bahrain to recognize Israel was an important achievement, whether or not Saudi Arabia and other Arab states follow suit. Diplomacy in Afghanistan has resulted in serious talks between the government and the Taliban that may end over 40 years of conflict there. Yet the administration has failed to address some of the most ominous new threats, often for partisan reasons.

Biological weapons and pathogens

If the coronavirus pandemic has taught us anything, it is that pathogens can be highly contagious and cost effective killers. Over the 20th century alone, about 300 million people died from smallpox, the variola virus that had killed a third of those it infected before a vaccine was developed. Yet before the collapse in 1991, the former Soviet Union was alleged to have secretly produced and stockpiled 100 metric tons of variola a year.

Classical biological weapons have proven hard for terrorists to make or use. Given the recent advances in biotechnology, however, the ability to create genetically modified superbugs is increasingly cheaper and more widespread. After 9/11 and the ensuing anthrax attacks, President Bush increased spending on germ threats. But the coronavirus pandemic has revealed the utter mismanagement of our preparedness effort.

Americans have died for lack of testing, treatment, and protective gear, rather apart from the president who, knowing what he said was untrue, repeatedly assured us that the coronavirus was not as serious as the flu, could miraculously disappear or may respond to a series of questionable treatments, and that wearing masks was not necessary. While Trump has poured billions into research to find a vaccine and better treatments, he has largely spurned the international medical surveillance networks and collaboration needed to spot the emergence of lethal pathogens.

Climate change and environment

While previous administrations warned of the danger of climate change, President Obama tried to define it as a national security priority. However, political foes mocked his Pentagon roadmap on the issue that identified climate climate as an urgent and growing threat to our national security and noted how environmental issues as rising seas, eroding coastlines, worsening droughts, melting icecaps, and devastating wildfires would endanger our 7,000 military installations around the world.

Skeptics also belittled the United Nations summit in Paris in 2015, at which the United States and some 200 countries pledged to reduce greenhouse gas and carbon output as soon as possible to stabilize global warming to well below 2 degrees centigrade. The decision from Trump to withdraw from that treaty on the earliest possible date, a day after the election this November, would leave the second largest emitter of greenhouse gases in the world as the only country to abandon this international effort. Despite the lack of an alternative strategy, Trump derided the Paris agreement as a total disaster that has harmed our competitiveness.

As deadly wildfires roared across the West Coast last week, consuming over 6 million acres of Oregon, California, and Washington, about double a typical season, West Coast residents endured toxic air, triple digit heat, and rolling blackouts. As a result, climate change has turned into a much more important election issue. If you are in denial about climate change, said Governor Gavin Newsom, come to California.

Severe weather damage to people and economies around the world has triggered destabilizing mass migrations on a scale that might ultimately deny The effort by Trump to secure our national border with a wall or by any other means. A World Bank study found that worsening weather for Southeast Asia, home to nearly a fourth of the global population, forced over 8 million people to move toward Europe, the Middle East, and North America. About 17 million to 36 million more could be on the move, the World Bank projects, with similar migrations in the Americas.

Digital networks and cyberthreats

As in so many areas, our offense is more developed than our defense of air space, critical dams, power grids, digital networks, and our other essential infrastructure. Although plenty of this information remains classified, the Washington Post, based on the documents provided by National Security Agency leaker Edward Snowden, noted several years ago that intelligence agencies had conducted more than 200 offensive cyberoperations during 2011 alone, with most targeting foriegn adversaries as Iran, China, Russia, and North Korea, and such activities as nuclear proliferation.

By contrast, government reports and independent studies suggest that our critical infrastructure, most of it in private hands, remains appallingly vulnerable. In March, the Cyberspace Solarium Commission, founded by the late Senator John McCain, issued the report finding that most of our digital networks which store, process, and analyze data have likely been compromised. We are in a new permanent state of conflict, indeed, of war, said a Russian expert with access to defense information.

Given our inability to protect our digital and physical infrastructure, it is not a war that the country is positioned to win. Microsoft recently joined intelligence agencies with asserting that the Russian military intelligence unit that attacked the Democratic National Committee in 2016 continues to launch ever stealthier attacks on both political parties.

The warning came a day after the government whistleblower alleged the White House and Homeland Security Department suppressed intelligence about continued Russian hacking because it made Trump look bad and ordered analysts to focus on Iran and China. The White House denies that charge, but the reluctance to criticize Vladimir Putin reinforces notions about whether he hopes to benefit from Russian hacking.

The allegation from Microsoft that Russia is a more sophisticated hacker than China or Iran also contradicts the White House narrative that China poses the more serious cyberthreat. Moreover, the finding that China has mostly targeted the campaign of Joe Biden undermines the White House charge that China is interfering with the election to assist him.

Domestic insurrection and unrest

The United States has more guns than people. So think about what right wing extremists might do if Trump is defeated in what they perceive to be a stolen election. Or, for that matter, what those anarchists and left wing extremists have been doing in Seattle, Portland, Kenosha, Rochester, and other cities where peaceful protests have turned violent at night.

In a recent virtual meeting hosted by the Common Good, an organization that encourages dialogue and bipartisan policies, Jane Harman, a former Democratic lawmaker who now directs the Wilson Center in Washington, and Michael Chertoff, a former Homeland Security secretary, agreed that while jihadi terrorism still poses a grave threat, the growth of domestic terrorism, notably right wing extremists, concerns them more.

The Center for Strategic and International Studies found, based on reviews of nearly 900 terrorist plots and attacks in the United States between 1994 and 2020, that not only did right wing attacks and plots account for the majority of domestic incidents and rose significantly, outpacing terrorism from other types of perpetrators, including those from far left networks and people inspired by the Islamic State and Al Qaeda. Right wing extremists perpetrated a majority of the plots and attacks in the country last year and over 90 percent this year.

Chertoff said that his paramount concern is that foreign or domestic interference with the voting process will undermine confidence and the legitimacy of our elections. Any protracted legal and political battle, he warned, would make the case of George Bush versus Al Gore look like a kindergarten exercise. Thus, the lack of faith in our democratic system might be the greatest threat of all to our national security.

Judith Miller is a fellow at the Manhattan Institute, a former reporter with the New York Times, and the author of The Story: A Reporters Journey.

Read this article:
We face deadly threats that would make the coronavirus seem minor | TheHill - The Hill

Why Antitrust Practitioners Should be Interested in Espionage – Lexology

The Five Eyes Alliance has its origins in cooperation between US and UK intelligence agencies during the Second World War. It solidified into the secret relationship between the intelligence agencies of Australia, Canada, New Zealand, UK and US during the Cold War. Its soubriquet Five Eyes came from the protective marking on intelligence material shared between the five allies AUS/CAN/NZ/UK/US EYES ONLY. The alliance remained in the shadows for decades details of some of its programmes coming to public prominence in the revelations by Edward Snowden in 2013.

Increasingly, the Five Eyes has become a more public arrangement. In June this year, Five Country Ministerial (FCM) meetings were held between Finance, Foreign and Home Security Ministers. In the past couple of years, the Five Eyes have adopted joint positions on a range of issues, from encryption in internet platforms, rare mineral supply, resilience in critical national infrastructure, the implications of COVID-19 for domestic security, economic recovery, and the situation in the Indo-Pacific region. Most recently, Five Eyes Anti-Trust Regulators have agreed protocols on information sharing, described by my colleague Francesco Liberatore below. This is particularly intriguing, as it is the furthest departure of Five Eyes activity from its core intelligence sharing and national security rationale.

So where is Five Eyes cooperation going? Clearly, it is developing and extending always on a nation state cooperation basis. The five countries differ in many ways, but share a common law underpinning, and a similar rationale for regulatory intervention. With over 460 million people and three G7 countries, the Five Eyes are a potentially significant economic grouping, as well as military/security. Given the highly international nature of the new economy, promoting cooperation between competition regulators makes perfect sense. Is it a first step in an emerging economic cooperation arrangement? Time will tell, but if it does the Five Eyes will have grown out of the murky world of intelligence cooperation into a major economic policy force.

Five Eyes Sign Cooperation Agreement in Competition Matters

Last week, the US Department of Justice, the US Federal Trade Commission, the UK Competition and Markets Authority, the Canadian Competition Bureau, the Australian Competition and Consumer Commission and the New Zealand Commerce Commission (the so-called Five Eyes intelligence alliance) signed a competition enforcement framework agreement.

The agreement aims to strengthen cooperation between them and enable the exchange of information on antitrust matters. The most important feature of this agreement is that it will allow the Five Eyes to exchange certain confidential information without having to obtain the prior written consent of the parties under investigation. This level of cooperation is already possible within the EU, but it is the first with competition authorities of countries outside the EU, or soon to be outside of the EU, as in the UKs case.

The main provisions of the new cooperation agreement are summarised below:

The agreement also allows facilitating voluntary witness interviews, and some suspect it might potentially also open the door for foreign enforcers seeking to interview individuals extradited to the US.

In all other instances, the Five Eyes will only be able to exchange any information obtained in the course of an investigation, provided they obtain prior waiver or written consent from the parties who provided such information. When such information contains personal data, this personal data may only be transmitted when the authorities making and receiving the request, respectively, are investigating the same or related conduct or transaction, and subject to the applicable data protection rules.

However, the Five Eyes will still not be permitted to discuss, request or transmit legally privileged information, nor will they be permitted to discuss or exchange information received under their respective leniency or settlement procedures, unless they obtain the leniency applicants prior written consent.

The agreement does not cover some recurrent issues in international competition law enforcement, but it leaves the door open for enhanced bilateral cooperation agreements. These enhanced bilateral agreements could, for example, bridge the following enforcement cooperation gaps:

Nevertheless, the agreement is intended to eliminate a problem enforcers face when they all run in different directions in pursuing investigations against the same company. This problem is particularly acute in digital markets, where conduct or transactions are inherently global; and requiring a company to change its conduct or merger in one country will likely have implications in other countries in which it is active.

Companies should take account of the implications of this agreement on their compliance programmes, dawn raid manuals, merger control filings and remedies discussions, as well as leniency and settlement applications, whenever the conduct or transaction in question may have effects in two or more of the Five Eyes countries. With our firms global platform, we are best placed to assist our clients in this regard.

Original post:
Why Antitrust Practitioners Should be Interested in Espionage - Lexology

Daniel Yergin: How division and unrest in the U.S. affect global power shifts – The Dallas Morning News

Daniel Yergin is an energy expert, and that means hes also an expert on global geopolitical relations. His first book, The Prize: the Epic Quest for Oil Money and Power, in 1990 told the saga of world history through the lens of oil. The continual changes in the industry and power politics have prompted him to write several more installments of the story.

This month, the latest in Yergins oil-and-power series was published, The New Map: Energy, Climate, and the Clash of Nations, this time exploring how the massive increase in oil production in the U.S. has redrawn the global power map. No longer is OPEC the power center, now its the Big Three producers, Russia, Saudi Arabia and the U.S., with China a key energy consumer.

How might the results of the presidential election affect the geopolitical map that you draw in the book?

I think a lot of things are set in place already. I mean, there is bipartisan consensus about China in Washington. So, theres not a great deal of room to move on that. On Russia, theres pretty bipartisan opposition. I think the big change would be actually on climate, where a Biden administration, one of its very first things would be to reengage with the Paris agreement.

We need to find a new stability in the relationship with China because these two countries are much more connected, interconnected, than people realize, but right now, trade and economics, which used to be stabilizing the balanced relationship is now very controversial.

People dont realize that China now has become one of the biggest customers for us oil and gas. And of course, energy is a very sensitive issue for the Chinese.

Ive been interested to observe Joe Bidens energy policy. He seems to have moved away from the Green New Deal in some key ways. Hes not calling for the U.S. to halt using fossil fuels. And he does support fracking and natural gas. Do you think this is a more realistic approach to the world or are we just forestalling the inevitable?

In Pittsburgh, he went out of his way to say, Im not going to ban fracking. Im not sure that a president can ban fracking in any event. But he does have a $2 trillion climate program. I also think he doesnt want to be a president who ends up presiding over a really rapid growth in U.S. oil imports. An abandon-fracking policy is really an import-more-oil policy.

What role does President Donald Trumps more friendly relationship with Russian President Vladimir Putin play in the map that you drew?

The president has been very careful not to criticize Putin, and Putin hasnt criticized him. But if you look overall, the U.S. has pursued a pretty tough policy on Russia. We put more sanctions on Russia, and then we put more sanctions on Russia. And the geopolitical reality is that Russia and China are coming more and more together.

I think a new president would have to ask: Do we need something in our policy beyond sanctions? Russias economy may be smaller than Italys, but it is the other major nuclear power. It has a huge arsenal and we cant forget the nuclear side of the relationship.

What are you thinking of beyond sanctions?

Where are areas where we can work with Russia? One of the points I make in the book is, it really started when Edward Snowden went to Moscow. And that was really the beginning of the breakdown.

We are headed into a kind of new cold war with Russia and certainly the risk of a different kind of cold war with China. Are there areas where common interests can be found to work with Russia? But then something happens like the poisoning of [opposition politician Alexei] Navalny, that disrupts, that just throws a spanner. I think a lot will be determined by what the conclusions are about Russian engagement in the 2020 presidential election. I think that could have a lot of consequences that arent good.

How are people outside the U.S. thinking about the division and protests here?

A couple of things I hear from people in other parts of the world, one is concern about political cohesion and division in the United States, which would make us a less reliable, less stable player in the world. They still look for a stabilizer and a leader, and they worry about a U.S. turned so much inward that it loses contact with that wider role in an unruly global system.

I think a second thing that I hear from other countries is concern about where the U.S.-China split is going to go, and whether theyll have to choose sides in some fashion. And they cant. How do they choose sides?

I did a dialogue actually with a president of one Latin American country. And he said our relationship with the United States is very strong, but Chinas a very big market for us. How do we navigate this?

How does new agreement between Israel and the United Arab Emirates fit into the geopolitical map?

Its a very explicit representation of the new map because in the book I wrote about the significance of the split between the Arab Gulf countries and Iran and how serious that is. And the UAE is also concerned about future U.S. engagement in the region, particularly when the U.S. doesnt import much oil. Its looking to secure its future.

Theres an economic element to the relationship with Israel, to connect with a dynamic regional economy, entrepreneurial economy, and at the same time, its a very significant strategic collaboration dealing with what is the common enemy, which is Iran. And also, both are quite concerned about the role of Turkey, because really its Turkey, Saudi Arabia and Iran that are competing for a leading role in in the region.

And I think that the drone attack last summer on the big Saudi oil facility raised the stakes in terms of vulnerability and the need for new technologies for security. And I think thats certainly one element of this new relationship between the UAE and Israel.

A question for the last couple of years you heard is, will the U.S. long-term be as interested in the region, if it really doesnt import much oil from the region? Because thats been so fundamental since the 1970s. And so I think its also saying, well, we cant just count on the relationship with the United States.

What happens to us oil production over the next year or so?

February of 2020 was when U.S. oil production reached its highest level ever, 13 million barrels a day. This could not have been imagined a decade ago. I think by the end of this year, the U.S. will probably be in the 10 million to 10.5 million barrel a day range. And we will probably be in that range, maybe 11 million bpd, until this time next year, assuming theres a vaccine and you start to see recovery. Youll see people conserving cash and doing as little as possible starting to spend again, because to maintain those production levels, you have to invest. But so much depends upon the courses of virus and a vaccine.

This Q&A was conducted, edited and condensed by Dallas Morning News editorial board member and commentary editor Elizabeth Souder.

Got an opinion about this issue? Send a letter to the editor, and you just might get published.

Read more:
Daniel Yergin: How division and unrest in the U.S. affect global power shifts - The Dallas Morning News

Partnering with Huawei is riskier than you think – Asia Times

The US governments ongoing offensive against Chinese tech flagship Huawei is sometimes portrayed as ham-handed American protectionism.This is also true of Washingtons restrictions on ZTE and several other Chinese surveillance-product companies.

The sanctions extend to companies supplying chips to Huawei and are also designed to dissuade or prevent companies and countries from using Huawei to build their 5G networks an area where the Chinese firm is a world leader. Many allege that Washington is attempting to cripple the Chinese player in order to allow US firms to catch up.

But as someone who has worked in computer and networks technology in the US, Japan and Korea, and as someone who is by no means a Donald Trump supporter personally, I welcome his administrations initiative in the area.

In 1988, with a then-freshly minted MBA, I made a career switch. Thanks to that switch, I was given deep dives into some of the arcane intricacies of computer and networks technologies.

Among those intricacies, no area is more complex than network security.As we surf the Internet, we take for granted the mind-numbing security challenges and confirmations taking place in real time as computers and network components work in tandem to assure efficient and secure communications.

But no matter how well designed the technology, it is ultimately susceptible to human overrides overrides that are intentional and often illegal.

Human risk factors trump the finest engineering.It would take a book even to briefly cover all these factors and that book would likely be out of date by the time it could be published.

But to mention a few concerns that have been linked to Huawei and other network providers: There exist trapdoors in operating systems and even in firmware that are routinely (though inappropriately) used by client companies system engineers as shortcuts to do ongoing maintenance.

If these shortcuts are unknown, the systems are safe. But once discovered, entire networks and datasets are endangered. And the shocking truth is that many of the risks are represented by in-house or contracted staff.

It was no accident that whistleblower Edward Snowden was hired as a systems engineer by a National Security Agency contractor, Booz Allen Hamilton. That gave him the run of the cyber office, and the ability to circumvent various safeguards.

Moreover, trapdoors can be purposely built into software and firmware code to allow a vendor or government agency access.Similarly, software keys for data access are sometimes intentionally shared with government intelligence and security agencies for national security reasons, such as during wars on terror, wars on drugs, and others.

Some technology providers refuse or resist this kind of cooperation demand from government agencies.Other companies do not. And even without hidden trapdoors and surrendered software keys, mischief is limited only by human creativity.

I have witnessed a networks benign features being used to red flag or trigger back-office computers to initiate activities totally unintended by the networks provider.

More commonly, a hacker will look among the various security levels of schemes found in computers operating systems, network security protocols and any other conceivable gateway when a personal computer, or even a smartcard, is verified.

That verification is an interaction within a security scheme which in turn provides a conceivable entry point for the bad guys.

In this regard, one may argue that it really doesnt matter if network technology is American, German, French, Finnish or Chinese.That is a fair argument.

However, there is a key component even more basic to all of this sophisticated, if at times vulnerable, technology.That component is human trust.

When a technology buyer selects a vendor, the assumption indeed, the demand is that the vendor is on the same team as the buyer.That means the vendor will do whatever is necessary to protect the buyers legitimate interests.

The situation is like trusting the engineering of your car, regardless of which country you may drive it.Such trust relationships are givens in all buyer-seller relationships or should be.

This issue is not simply about companies, it extends to countries. And while all companies, it could be argued, may compete with some degree of equality in related business global sectors, not all countries are the same, compete the same, or have the same systems of governance.

Even though China is undertaking capitalism with Chinese characteristics it is still firmly ruled by the Communist Party of China (CPC).The partys management and potential interference in all and any aspects of Chinese life and commerce has to be acknowledged.

Being a good party member is being a compliant party member, and compliance with the state is a feature of corporate practice. On Wednesday, the partysUnited Front Work Department issued guidelinesto strengthen the guidance and supervision of private businesses, while demanding that owners and managers keep up to speed on party tenets and President Xi Jinpings thoughts.

In liberal democracies, such as those found in North America and Europe, it is expected that technology providers will push back or even openly challenge their governments secretive snooping into customers networks and data.That is not the case of China.

Moreover, it is worth notingthat Huaweis founder and chairman, Ren Zhengfei, was a deputy regimental chief in thePeoples Liberation Army and remains a senior member of the CPC.While Chairman Ren has repeatedly assured the public that he would do his utmost to protect his customers, one needs to be mindful of his relationship with his government.

Huawei has already been forced to deny allegationsof its technology being used by the Xinjiang internal security forces for data analysis, and that companies operating in the Xinjiang regionsupplying Huawei use forced labor.

Even if the above and other allegations of intellectual property theft and patent infringement are false, another ongoing episode related to Huawei and the geopolitical complications that surround it should be born in mind by those who reside in democracies with rule of law.

That episode is the current hostage game being played out involving Chairman Rens daughter,Meng Wanzhou, former Huaweichief financial officer, and two Canadians arrested for unspecified national-security violations in China.

The US government accuses Meng of violating long-standing sanctions on Iran, including against the exportation of US technology goods into Iran. On August 22, 2018, a New York court issued an arrest warrant for Meng to stand trial in the US.

On December 1, 2018, Meng was arrested in Canada at the request of US authorities. Judicial proceedings are currently underway over her possible extradition to the US.

In China, in the same month,Beijingdetainedtwo resident Canadians, MichaelSpavor andMichael Kovrig,on charges of endangering the state. The detention of the two has been widely analyzed as being linked to Mengs detention.

But while Meng has been under house arrest and must wear an ankle detection device while reading books and doing her oil painting, Spavor and Kovrig were reported at one time to be held in isolation without being allowed outdoors, kept under lighting and surveillance 24 hours a day, with hours of interrogations per day.

The British Broadcasting Corporation has noted that during regular ChineseForeign Ministry press briefings, various spokespeople routinely mention the fate of the Canadians and that of Huawei founders daughter in the same response whether theyve been prompted to do so or not by reporters.

Party media outlets have been barefaced in demanding that Canada release Meng if the Canadians want their former diplomat and businessman back.However, the Canadian government and judiciary are firewalled, preventing ad hoc compliance. The Chinese government has no such constraints.

Some may say that concerns about CPC involvement in Huawei technologies in customers networks have yet to be proved.That may be true.But more broadly, we have the above example of the CPC taking action on behalf of Huawei, suggesting that the two parties are connected at the hip.

Furthermore, when theft is copying rather than physical removal, the crime is usually discovered if at all only after the fact.

At the end of the day, technology providers are guardians of their clients most valuable data and competitive advantages.Everyone wants those guardians to be willing to do whatever it takes to fulfill the mission.

While Chinese guardians may be generally loyal to their customers, in a country where business and politics are so tightly interlinked, the limits of this loyalty to overseas customers whose governments may be at odds with Beijing could prove minimal.

Tom Coyner worked for more than 20 years in the US, Japan and Korea in computer systems and large networks hardware and software, including as a Japan country marketing director and as Korea country manager.Currently he provides business consulting services to companies dealing with the Korean market as well as contributing text and photography to international media.

Asia Times Financialis now live. Linking accurate news, insightful analysis and local knowledge with the ATF China Bond 50 Index, the world'sfirst benchmark cross sector Chinese Bond Indices.Read ATFnow.

Continue reading here:
Partnering with Huawei is riskier than you think - Asia Times

Why people betray their countries, according to an Israeli expert – Haaretz.com

Dr. Ilan Diamant, how does a clinical psychologist come to work for the Prime Ministers Office in Tel Aviv?

I started my clinical studies and training relatively late. Because a novice psychologist doesnt earn a lot of money, and because intelligence work intrigued me, I started to work assessing potential candidates for the secret services. At one point, I was persuaded to switch to working as a psychologist within the framework of Israels [foreign] intelligence services whats known as the Prime Ministers Office in Tel Aviv. I worked there for more than a decade.

What was the job description?

Effectively, I covered two fields: assessment and evaluation, and therapy.

Therapy? In other words, the position includes providing psychological support to the organizations staff?

All the clandestine organizations employ psychologists. People who engage in this type of work undergo an all-encompassing experience, so its right to have a psychologist on hand to work with them vis-a-vis the difficulties they encounter in their personal and professional lives.

What does the assessment part involve?

It serves a variety of functions, among them coming up with predictive analyses about the candidate. Does he have the requisite stamina to withstand the pressures entailed in this work? Is he capable of working in this sort of framework?

One of the aspects thats examined is the level of danger a possible candidate poses to the organization itself: that is, his potential to cross the lines.

We try to predict the risk potential. Is this person capable of being loyal to the organization? Crossing the lines is not only treason against the state and the supply of information to the enemy: It can also take the form of sharing secrets hes entrusted with, with friends or partners. Betrayal of the state is a more complex matter, about which not enough knowledge exists, unfortunately. I am writing a book about this subject together with Shlomo Peled, who is also a psychologist and involved in intelligence. We are translating the experience weve gleaned into written form, because there is simply no orderly protocol that deal with the subject. In any event, its important to understand that treason is more a declarative than a substantive term. Very few people in Israel have been [formally] accused of treason. If anything, they are accused of harming state security.

Its hard to prove treason and in any event treason, as such, is a relative term.

I prefer to call that type of behavior breach of trust. We violate the trust of the people who have confidence in us. That viewpoint broadens the conception regarding people who possess the potential to be disloyal.

That potential exists in all of us, doesnt it?

Freud wrote that, because we are born to two people mother and father the question of whom I am loyal to is part of everyones universal essence. If you psychologically deconstruct the concept of loyalty, it comes down to the basic relations between a mother and her infant. If infants can trust their mother to fulfill all their emotional needs as they develop, they will learn to be trusting of the world. Those people have a lower risk potential if they are employed by a secret organization, because they are capable of trusting the organization, of being loyal to it.

So anyone who had a difficult childhood or uncertain relationships is disqualified from the outset?

Heaven forbid. The question is not what happened in childhood, but what the person did with those experiences. How they have succeeded in coping with crises, in maturing. Because all of us, potentially, can be disloyal, we examine the candidates inner strengths and their ability to adjust, particularly during crises and transitions in life.

Can you give an example?

I will use the simplest example: Mordechai Vanunu [who spent 18 years in prison for revealing Israeli nuclear secrets]. Everything I say is based on open sources. Lets examine the transitions in his life. He grew up in a religiously observant family but dropped out of his religious high school and abandoned religion; some say that because of this he was also compelled to sever relations with his family. After a few years, he moved from the right side of the political map to the left even radical side. At this stage he was already working at the Negev Nuclear Research Center and he was summoned for a reprimand because of his political activity. He chose to ignore this and thus demonstrated an inability to accept authority and a problem with adjustment. After he was fired he began to wander around the world and converted to Buddhism and afterward to Christianity. Of course, I do not purport to know what his pre-employment assessment said, but the sharp transitions point to a high risk potential, to disloyalty.

American psychiatrist David Charney took part in compiling a CIA report on the psychology of betrayal. Among the traits he enumerated that heighten the likelihood that a particular person will betray the organization are damaged attachment skills, a broken family, despair, impulsivity, sociopathy, narcissism a broad range.

The range is broad, and that definitely raises the question of screening, because these are very common traits and phenomena. Dr. Charney interviewed the traitor Robert Hanssen [an FBI agent who spied for Russia in the 1980s and 90s]. He met with Hanssen once a week in prison, and from those meetings he arrived at the insight he put into his report. The most significant one, from my viewpoint, is that there are no happy traitors. No one does such things joyfully and wholeheartedly. All traitors act as they do out of genuine distress psychological, emotional but the betrayal solution is pathological in nature. It doesnt provide them with what they need.

What about concrete motivations, such as material rewards, or a psychological one, such as revenge, a release of frustration even the need for a thrill?

The professional literature cites four main motives for betrayal, with the acronym MICE: money, ideology, compromise and ego. But those are only the external factors. A person who knows who he is and what he is, whose identity is clear, who possesses a mature personality and is well adjusted, will be capable of rebuffing temptation. However, a person who has, lets say, a powerful need for feeling self-esteem, because he didnt get that as a child, is definitely liable to turn to betrayal in order to attain it.

Given the connection between a personality with such tendencies and possible motivations, what will tip the scales personality or motivation?

What will tip the scales are the braking forces, which are part of the personality. In other words, the presence of inhibitors that safeguard a person from falling into the abyss. The ability to feel and understand that they are on the brink, and must stop doing what they are doing: trying to fulfill that pathological need. When [Aldrich] Ames, one of the major American traitors [a CIA agent who sold information to the Soviets, and was convicted in 1994] was asked why he did what he did, he said, after thinking about it at length, that it wasnt for the money as he had found it convenient to tell himself and his milieu but that he simply didnt really know why. And that is the answer.

At the moment of betrayal, the person doesnt really think. They enter into a kind of dissociative state, they are detached from external circumstances, from the consequences, convinced that they will satisfy an urge, whatever it may be, and will feel good. Ames, who needed money, didnt consult with anyone, didnt consider other solutions, didnt think what his action would do to his wife, his children, his superiors. He simply went for it.

As in a crime of passion.

Yes. He just didnt think at that moment about the consequences of his behavior, about the price.

So betrayal is not a calculated act? Its impulsive?

Its an act that is impulsive because in effect it consists of not resisting temptation, and of a void in his personality that cannot be filled normatively and whose satisfaction is always pathological. By the way, it can be an act that seems to be rational, outwardly. All of us employ rationalizations all the time.

Betrayal is a relative term, and life itself is a kind of war of narratives. I can tell myself whatever story I wish.

Thats exactly the point: Anyone can do it. As the person doing the assessment, I will want to know the story you tell and to what extent you believe yourself.

If I tell myself, say, that I am a freedom fighter and not greedy for money, will that make it easier for me to be disloyal?

No traitor tells himself, I am a traitor. To start the betrayal engine he has to devise for himself a positive alternative narrative and bridge the cognitive dissonance he feels. Betrayal for money is relatively rare. The motives of most of the well-known traitors were ostensibly ideological. For example, Marcus Klingberg [an Israeli scientist who crossed the lines and spied for Russia].

The story of treason can also be one of heroism. I think Klingberg claimed he never received anything in return, that he only wanted to reward the Russians for having saved the world from Nazism.

He claimed he didnt even want anything in return, that he only wanted to save the world. Vanunu said something similar at one point. Thats a matter of rationalization. And what are the layers that lie below? The experience of oneself as victim and when I experience myself as a victim, I need to help the weak, because the weak are actually me. Those are exactly the psychological components we try to discover. Klingberg, who wanted to help the Russians and to prevent World War III, or [Edward] Snowden, who wanted to save the public and to leak secret information about the surveillance plans of the NSA [National Security Agency], are the ideological spies who construct in their consciousness the narrative of freedom fighters for an ideal world.

The thing is that self-deception is always in the eye of the beholder. Whoever does things for their country that go beyond fulfilling their own needs, is considered a savior in their own eyes. Betrayal for them is a heroic deed, self-sacrifice for the common good. But the hero of one side is the traitor of the other side.

Another report, issued by the U.S. Defense Department, collected and analyzed information about 150 traitors. Some of them underwent psychological tests and in-depth interviews. The report points to two personality patterns among traitors: a dominant, manipulative personality, and a passive, dependent personality.

What both patterns have in common is that they are characterized by egocentrism, by a heightened preoccupation with themselves and indifference to the difficulties of others. In addition, the biographical background of a large number of the traitors includes an experience of a significant conflict with a father figure. Take, for example, Ashraf Marwan [an Egyptian who worked for the Mossad], who had a dependent, passive personality. He married the daughter of [Egyptian President Gamal Abdel] Nasser, in spite of the latters displeasure. Nasser arranged a low-level [government] position for him that not only didnt meet his expectations but was a serious blow to his pride. Nasser also instructed his confidants to keep an eye on Marwan, to ensure that he would not embarrass the president and his family.

After Egypts defeat in [the Six-Day War in] 1967, the affronted and angry Marwan approached an Israeli embassy and offered his services. After a long and complex process, it was decided to recruit him as an agent. His Israeli handlers understood that the way to utilize him was to fulfill his need for an appreciative and laudatory father figure, which Nasser refused to be. His need for such a person, who would esteem and accept him, led to the then-head of the Mossad, Zvi Zamir, being involved in handling him. Its rare for the head of the Mossad to handle an agent. Marwans need was that blatant.

What about a dominant, manipulative personality?

Biographers of Kim Philby, the British agent who spied for the Soviets, described the personality of an arch-megalomaniac selfish, charismatic and conscienceless. He betrayed his sources, his own agents, informed on them to the Russians and led them to their deaths. Philbys father was described as a colorful character, preoccupied with himself and with an impulse for adventure, which was manifested in a great deal of traveling, multiple mistresses and conversion to Islam. Philbys mother was completely passive.

Because of his travels, the father was often away from home, and his young son experienced him in terms of a pompous presence and a physical absence a relationship with a father who promises but doesnt follow through, who was proud of him when he was successful and humiliated him when he failed. Philby himself was married four times. He cheated on his second wife and claimed that she tried to kill him. The psychiatrist who treated him testified that Philby subjected her to mental abuse and pushed her to suicide. She was found dead in her apartment, in circumstances that are not known to this day, but Philby was by then already in a romantic relationship with the person who would become his third wife, who was married to a close friend of his.

If I live an entire life whose essence is concealment keeping secrets from my partners, my friends, my family why would I not also conceal things from the person responsible for me in the organization? Lie to him? What will hold me back?

What will hold you back is the context of the way you are treated. Basic relations of trust with the system. Without such relations, there is no loyalty. If I suspect that the system is not telling me the truth, that can generate frustration and resistance, even a counterreaction. You wont tell me and I wont tell you. That is genuinely dangerous. The employee is meant to have a relationship with those in authority in which he can trust them implicitly, and if that doesnt exist, theres simply nothing to talk about.

Relations in which we feel that we are being used, in which there is no mutuality, are dangerous. When hitches like that arise they need to be corrected immediately, not at the level of the employee but at the level of the system. Theres also no shortage of senior figures who are not above reproach.

In other words, the way the organization is managed will determine in large measure whether there will be traitors in it.

The management of employees in the organization. Definitely. Snowden, for example, encountered difficulties when he was working for the CIA. He was in distress, he needed help, someone at his side. Did anyone check to see how far his superiors pressed him? Maybe thats what pushed him to behave as he did?

But when everyone is playing mind games with everyone, its hard to know where the boundary lies. After all, his administrator or team head is also a person who lies and manipulates. Thats the job. How can I know that hes not lying to me?

You cant. Not really. But theres a difference between a manipulative personality and a personality with manipulative abilities. The filtering and the assessment tests are intended to check that, too whether I possess manipulative ability, but am not a manipulative person. I do what I need to do within the job framework, but I am not manipulative when I come home and I am not manipulative toward my friends. The manipulation is a tool; it is not who I am.

If we think about the need for thrills, the ability to maintain a life of lies and contradictions and concealment in the end, theres a correlation between people who are prone to betrayal and people who are prone, from the outset, to desiring to a career as a Mossad agent.

A correlation exists between people who are prone to betrayal and people who will be attracted to work in an intelligence organization. Thats true. The espionage world is a place of deceptive mirrors, reflections amid reflections, and when the agent has multiple identities and covers, he is liable to become confused. His anchor is judgment of reality. Theres a saying: The traitor is the one who betrays himself.

In the end, the traitor will be the person who fails the test of reality and believes that he is someone he is not. The healthy person working in intelligence will be the one who succeeds in executing the transitions between different identities and remaining the same person. Even when hes on a mission in which he wears a suit and drives a Jaguar, he doesnt forget that hes an Israeli, lives on the third floor of an apartment building in Rishon Letzion and hasnt finished paying off the mortgage.

Do you think that the degree of trust and commitment a person feels toward the state can affect his capacity to betray it? Is that temptation heightened in periods of crisis? Can anger or despair facilitate that choice?

The degree of trust and commitment to the state can change if the state is caught up in anarchy and political and social chaos the brakes grow slack, the opportunism increases, and every bastard is a king. There will be a higher probability that lines will be crossed, because the boundaries become blurred. Think, for example, of Breaking the Silence [the anti-occupation organization of former soldiers who speak publicly about their experiences in the territories] as an example that of motivation based on anger and frustration, in circumstances of a lack of transparency of the military and political leadership. Is it traitorous? No, because it doesnt involve revealing confidential material that harms state security. Again, treason is an elusive concept, which is why we have the term harming state security or passing classified information to a hostile source.

Perhaps we can talk a little about the social function of the traitor. The sociologist Nachman Ben-Yehuda wrote that its society that marks the traitor, with the aspiration of making clear who is on our side and who endangers us. Who, then, is a traitor? Is Tali Fahima [a pro-Palestinian Israeli activist, convicted in 2005 of having ties with the Al-Aqsa Martyrs Brigades], for example, a traitor?

Treason is actually the shattering of a social taboo of commitment and mutual loyalty, which are a condition for belonging to a group, a community or an organization. The taboo emphasizes that one must act according to the rules of the collective, and even in a case of extreme disagreement, one does not shift sides and play in the adversarys group. Tali Fahima, or for that matter people who abandon their faith, are not harming state security and obviously are not violating a legal commitment to maintain secrecy. They defy social norms. They do not meet the expectations of their group of affiliation, and as such they undermine the resilience of social consent.

If [soccer player Lionel] Messi moves from Barcelona to the Italian team of Juventus, millions of fans will undoubtedly be disappointed, but if he moves to Real Madrid, the nemesis of Barcelona, all the headlines will scream Traitor. Inflated use of the term treason for every disagreement renders it a blurred concept. If 30 percent of the community are traitors, then no one is a traitor. If every police officer who breaks up a demonstration is a Nazi, then who is [really] a Nazi?

I read a fine definition, cited by attorney Avigdor Feldman: A countrys level of democracy is measured by the broadness of the definition of the crime of treason in its law books. The more general the definition, the farther that country is from the values of democracy.

The more clauses a countrys penal code contains, the less democratic that country is. The Israeli Penal Code contains about 500 clauses, some of them in the nature of definitions. In other words, there are only 500, and perhaps even fewer, illegal types of behavior. Everything else is permitted. This is a democracy that minimizes criminal prohibitions. The question is, when does such minimizing turn the country into anarchy, because in such a country all offenses and all paths are permitted, in peoples perception; they think everything goes. At the other end of the continuum is the totalitarian state in which what is not permitted, is forbidden. That notion reinforces the position holding that the offense of treason should be reserved for extreme cases only, so that not everyone about whom there is controversy is branded a traitor.

Read more here:
Why people betray their countries, according to an Israeli expert - Haaretz.com

8 disturbing movies and shows on social media and Big Data, on Netflix and Amazon Prime Video – VOGUE India

Who doesnt appreciate a good watch exploring the dark side of technology? Sure, it's scary considering some of the situations are highly relatable, and when the realisation that it may be happening to us, hits home. But chances are that these movies and shows will make you question things that have been so normalised, we don't look up from our screens to think about them. From the recently trending documentary The Social Dilemma to the nail-biting drama Searching, here's what you should tune into if you're in the mood for a reality check on Big Data.

The name Cambridge Analytica was in the news a lot in 2018for all the wrong reasons. The data company came into the limelight for accumulating personal information from millions of Facebook users without their consent. Its agenda was targeted towards political advertising, which raised a lot of questions on the ethicality of Facebook's privacy policy. The Great Hack tries to get to the bottom of this data scandal by showcasing accounts by professor David Carroll, British investigative journalist Carole Cadwalladr, and former business development director for Cambridge Analytica, Brittany Kaiser.

Streaming on Netflix

The docudrama highlights the toxic impact of social media on humanity. While this statement may seem generic, the revelations made in this series are certainly not. The information about the subtle ways in which Silicon Valley giants attract and manipulate our attention, given by some of the most influential names in the industrymany of them high ranking ex-employees and foundershits scarily close to home. It also shows how these companies use their audience base for profits as they sell user data and surveillance information, influencing political agendas across the world. The impact of these apps on mental health is also touched upon in detail.

Streaming on Netflix

If you can't trace a person's digital footprint in present times, they're as good as non-existent. David Kim (John Cho) fails to get in touch with his 16-year-old daughter after a night out at her friend's place. Eventually realising she's missing, he reports it and an investigation is initiated. 37 hours pass and authorities fail to uncover even a single lead. As David gets desperate for answers, he decides to investigate his daughter's laptop and starts conversing with her friends on Facebook. Through his efforts, he eventually comes across secrets which may bring his world crumbling down. The entire film is shown through smart devices and social media apps to highlight their true impact on our daily lives.

Available to buy on Amazon Prime Video

Based on the lucrative phishing scams that are so prevalent in our country, Jamtara unearths the whole process and blends it with an intense narrative. Two cousins who run a phishing scam and make a decent profit off of it, but a news piece on it throws the whole network under the bus. To think the police would put an end to it is far from the truth, as a local politician takes the boys under his wing to earn an extra buck himself.

Streaming on Netflix

Having robots at your beck and call to do all the chores at home that you despise, is an ideal future scenario for many. However, Humans is here to give you a slightly different perspective on how things may not be so hunky-dory. Set in an alternate reality, the show is about a must-have piece of technology called a Syntha highly sophisticated humanoid robot designed for human help. When the Hawkins family buys a restored Synth to ease their lives, they come to realise that living with a droid can have dangerous implications.

Available to buy on Amazon Prime Video

Joseph Gorden-Levitt plays the infamous Edward Snowden in this brilliantly curated biopic. Disappointed with the agenda of the intelligence agency, Edward quits his job at the NSA when he comes across colossal amounts of data being assembled to trace all forms of digital information. This includes not only foreign governments and terrorist organisations but also regular American citizens. He makes the hard decision to leak this information at the cost of his safety and freedom. As people are shocked to learn the true intentions of the government, Edward is deemed a traitor.

Available to buy on Amazon Prime Video

"Our democracy has been hacked" is the tagline around which this show is weaved. Narrating the story of a brilliant engineer, Elliot Alderson, who suffers from social anxiety and clinical depression, Mr Robot dives into the dark world of a global conspiracy which threatens the privacy of the world. Elliot acts as a cybersecurity expert by day and a hacking vigilante by night. His skills see him approached by a secret underground organisation to take down the corporate world including the company he works for. The situation catapults him into the centre of an ethical dilemma but his ideals to do the right thing prevail.

Streaming on Amazon Prime Video

A virtual slap in the face of humanity, Black Mirror focuses on an alternate reality where the screens that influence our lives have slowly transformed into the reason for our existence. The anthology focuses on a constant battle with technology not in the Terminator sort of way, but darker, more insidious. It highlights more of the subtle destruction of human conscience as technology beats it into submission, rendering it moot. Each episode details a different scenario ranging from severely dark to satirical.

Streaming on Netflix

8 thought-provoking dystopian movies and shows to stream on Netflix, Amazon Prime Video and Disney+ Hotstar

12 brilliant science fiction movies and shows you can watch on Netflix, Amazon Prime Video and Disney+ Hotstar

See the original post:
8 disturbing movies and shows on social media and Big Data, on Netflix and Amazon Prime Video - VOGUE India

Assange was offered presidential pardon to help ‘resolve’ Russia role in DNC hack, court told – NBC News

LONDON WikiLeaks founder Julian Assange was offered a presidential pardon if he helped to resolve the "ongoing speculation about Russian involvement" in the hacking of Democratic National Committee emails leaked during the 2016 U.S. election campaign, a London court heard Friday.

Assange's lawyer, Jennifer Robinson, said she saw then-Rep. Dana Rohrabacher, R-Calif., and Trump associate Charles Johnson make the offer during an August 2017 meeting at London's Ecuadorian Embassy, where Assange was evading arrest at the time. His seven-year stay there came to an end in April 2019 when Ecuador revoked his political asylum and invited police officers inside to arrest him.

Rohrabacher and Johnson said Trump knew about the meeting and approved offering Assange what they described as a "win-win" proposal, according to Robinson's statement provided to Assange's hearing in Old Bailey court.

Assange, 49, is fighting extradition to the U.S. where he faces up to 175 years in prison on espionage charges over WikiLeaks' release of confidential diplomatic cables in 2010 and 2011.

Download the NBC News app for breaking news and politics

Let our news meet your inbox. The news and stories that matters, delivered weekday mornings.

"Rohrabacher explained that he wanted to resolve the ongoing speculation about Russian involvement in the Democratic National Committee (DNC) leaks to WikiLeaks," Robinson said. "He said that he regarded the ongoing speculation as damaging to U.S.-Russian relations, that it was reviving old Cold War politics, and that it would be in the best interests of the U.S. if the matter could be resolved."

In return, the men offered "some form of pardon, assurance or agreement which would both benefit President Trump politically and prevent U.S. incitement and extradition" for Assange, Robinson said in the statement.

At the hearing Friday, James Lewis, prosecutor for the U.S. government, said: "The position of the government is we don't contest these things were said. We obviously do not accept the truth of what was said by others."

Robinson said she and Assange asked the men to make the case to Trump that he should be released purely on First Amendment grounds, noting that President Barack Obama had already commuted the sentence of Chelsea Manning, the former Army intelligence analyst previously sentenced to 35 years for giving classified information to WikiLeaks.

They did not offer to disclose the source of the leaks because that would not be "consistent with WikiLeaks editorial policy," she said.

Responding to the claims when they surfaced earlier this year, White House press secretary Stephanie Grisham called the allegations "absolutely and completely false."

Trump "barely knows Dana Rohrabacher other than he's an ex-congressman. He's never spoken to him on this subject or almost any subject," Grisham said. "It is a complete fabrication and a total lie. This is probably another never-ending hoax and total lie from the DNC."

Rohrabacher has also denied making such an offer.

"At no time did I offer Julian Assange anything from the president because I had not spoken with the president about this issue at all," Rohrabacher said in a February statement. "However, when speaking with Julian Assange, I told him that if he could provide me information and evidence about who actually gave him the DNC emails, I would then call on President Trump to pardon him."

He said that on his return to Washington he "wasn't successful in getting this message through to the president" but that "I still call on him to pardon Julian Assange, who is the true whistleblower of our time."

Alexander Smith is a senior reporter forNBC News Digital based in London.

Michele Neubert is a London-based producer for NBC News.She has been awarded four Emmy Awards, an Edward R. Murrow Award and an Alfred I. duPont Award for her work in conflict zones, including the Balkans, Afghanistan and Kurdistan.

Go here to see the original:
Assange was offered presidential pardon to help 'resolve' Russia role in DNC hack, court told - NBC News

Assange Extradition Trial Day 7: Pentagon Papers’ Daniel Ellsberg Testifies No Evidence Anyone Died as a Result of Wikileaks – River Cities Reader

Opponents of WikiLeaks founder Julian Assange often hold up Pentagon Papers whistleblower Daniel Ellsberg as an example of someone who was responsible for a good leak. They insist WikiLeaks is not like the Pentagon Papers because supposedly Assange was reckless with sensitive documents.

On the seventh day of an extradition trial against Assange, Ellsberg dismantled this false narrative and outlined for a British magistrate court why Assange would not receive a fair trial in the United States. [Daniel Ellsberg's 8 page written statement to the court is available here.]

Assange is accused of 17 counts of violating the Espionage Act and one count of conspiracy to commit a computer crime that, as alleged in the indictment, is written like an Espionage Act offense.

The charges criminalize the act of merely receiving classified information, as well as the publication of state secrets from the United States government. It targets common practices in news gathering, which is why the case is widely opposed by press freedom organizations throughout the world.

James Lewis, a prosecutor from the Crown Prosecution Service who represents the U.S. government, told Ellsberg, When you published the Pentagon Papers, you were very careful in what you provided to the media.

The lead prosecutor highlighted the fact that Ellsberg withheld four volumes of the Pentagon Papers that he did not want published because they may have impacted diplomatic efforts to end the Vietnam War. However, Ellsbergs decision to withhold those volumes had nothing to do with protecting the names of U.S. intelligence sources.

As Ellsberg described for the court, the 4,000 pages of documents he disclosed to the media contained thousands of names of Americans, Vietnamese, and North Vietnamese. There was even a clandestine CIA officer, who was named.

Nowhere in the Pentagon Papers was an adequate justification for the killing that we were doing, Ellsberg said. I was afraid if I redacted or withheld anything at all it would be inferred I left out the good reasons why the U.S. was pursuing the Vietnam War.

Ellsberg was concerned about revealing the name of a clandestine CIA officer, though he mentioned the individual was well-known in South Vietnam. Had he published the name of the officer today, the Intelligence Identities Protection Act could have easily been used to prosecute him. But he left it in the documents so no one could make inferences about redacted sections that may undermine what he exposed.

Like Assange, Ellsberg wanted the public to have a complete record.

This did not exactly distinguish Ellsberg from Assange so Lewis explicitly highlighted an article, Why WikiLeaks Is Unlike The Pentagon Papers, by attorney Floyd Abrams, which he wrote for the Wall Street Journal.

Abrams was one of the attorneys who represented the New York Times in the civil case that argued the government should not be able to block the media organization from publishing the Pentagon Papers. And like Lewis, Abrams fixated on the four volumes that were kept confidential.

Ellsberg insisted Abrams was mistaken. He never had any discussion with Ellsberg while defending the right to publish before the Supreme Court so Ellsberg said Abrams could not possibly understand his motives very well.

In the decades since the Pentagon Papers were disclosed, Ellsberg shared how he faced a great deal of defamation and then neglect to someone who was mentioned as a clear patriot. He was used as a foil against new revelations from WikiLeaks, which were supposedly very different. Such a distinction is misleading in terms of motive and effect.

Ellsberg noted Assange withheld 15,000 files from the release of the Afghanistan War Logs. He also requested assistance from the State Department and the Defense Department on redacting names, but they refused to help WikiLeaks redact a single document, even though it is a standard journalistic practice to consult officials to minimize harm.

I have no doubt that Julian would have removed those names, Ellsberg declared. Both the State and Defense Departments could have helped WikiLeaks remove the names of individuals, who prosecutors insist were negatively impacted.

Yet, rather than take steps to protect individuals, Ellsberg suggested these government agencies chose to preserve the possibility of charging Mr Assange with precisely the charges he faces now.

Not a single person has been identified by the U.S. government when they talk about deaths, physical harm, or incarceration that were linked to the WikiLeaks publications.

The lead prosecutor asked Ellsberg if it was his view that any harm to individuals was the fault of the American government for letting Assange publish material without redactions.

Ellsberg indicated they bear heavy responsibility.Lewis attempted to trap Ellsberg into conceding Assange had engaged in conduct that resulted in grave harm to vulnerable individuals. He read multiple sections of an affidavit from Assistant U.S. Attorney Gordon Kromberg, who is in the Eastern District of Virginia where Assange was indicted.

It covered a laundry list of allegations: they named local Afghans and Iraqis that were providing information to coalition forces, forced journalists and religious leaders to flee, led to harassment of Chinese academics labeled as rats, fueled violent threats against people who met with U.S. embassy staff, resulted in Iranians being identified and outed, and spurred violence by the Taliban.

How can you say honestly and in an unbiased way that there is no evidence that WikiLeaks put anyone in danger? Lewis asked.

Ellsberg told Lewis he found the governments assertions to be highly cynical. He invited Lewis to correct him if he was wrong, but it is his understanding that no one actually suffered harm as a result of these threats. Did one of them suffer the carrying out of these threats?

Lewis replied the rules are you dont get to ask the questions. He tried to move on as Ellsberg insisted he be allowed to provide the rest of his answer, but Judge Vanessa Baraitser would not let Ellsberg complete his response.

It deeply upset Assange, who spoke from inside the glass box where he sits each day. Baraitser reminded him not to interrupt proceedings as Edward Fitzgerald, a defense attorney, attempted to convince the court that Ellsberg should be able to finish his answer.

Lewis continued, Is it your position there was absolutely no danger caused by publishing the unredacted names of these informants?

In response, Ellsberg said the U.S. government is extremely cynical in pretending its concerned for these people. It has displayed contempt for Middle Easterners throughout the last 19 years.

As Lewis insisted one had to conclude Iraqis, Afghans, or Syrians named in the WikiLeaks publications were murdered or forced to flee, Ellsberg refused to accept this presumption.

Im sorry, sir, but it doesnt seem to be at all obvious that this small fraction of people that have been murdered in the course of both sides of conflicts can be attributed to WikiLeaks disclosures, Ellsberg stated.

If the Taliban had disappeared someone, Ellsberg said that would be a seriously harmful consequence. I am not aware of one single instance in the last 10 years.

At no point did the lead prosecutor offer any specific example of a death, and so the record remains as it has been since Chelsea Manning was put on trial. The government has no evidence that anyone was ever killed as a result of transparency forced by WikiLeaks.

Ellsberg informed the court his motive was no different from Assanges motive. The Espionage Act charges that Assange faces are not meaningfully different either. And, in fact, he faced efforts by the government to wiretap and incapacitate him just like Assange did while in the Ecuador embassy in London.

Ellsberg recalled that he did not tell the public what led him to disclose the Pentagon Papers because he expected to be able to testify about his motive during his trial.

When his lawyer asked him why he copied the Pentagon Papers, the prosecution immediately objected. Each time his lawyer tried to rephrase the question, the court refused to permit him to tell the jury why he had done what hed done.

Federal courts continue to handle Espionage Act cases in the same manner. The notion of motive or extenuating circumstances is irrelevant, Ellsberg added.

The meaning of which is I did not get a fair trial, despite a very intelligent and conscientious judge. No one since me has had a fair trial.

Julian Assange could not get a remotely fair trial under those charges in the United States, Ellsberg concluded.

Kevin Gosztola is managing editor of Shadowproof, where this article originally appeared.

Read the original:
Assange Extradition Trial Day 7: Pentagon Papers' Daniel Ellsberg Testifies No Evidence Anyone Died as a Result of Wikileaks - River Cities Reader

A Nobel for Thunberg? In the age of climate change and virus, it is possible – Reuters

OSLO (Reuters) - This years Nobel Peace Prize could go to green campaigner Greta Thunberg and the Fridays for Future movement to highlight the link between environmental damage and the threat to peace and security, some experts say.

FILE PHOTO: Swedish climate activist Greta Thunberg holds a poster reading "School strike for Climate" as she protests in front of the Swedish Parliament Riksdagen, in Stockholm, Sweden, September 4, 2020. Sep. Fredrik Sandberg/TT News Agency/via REUTERS

The winner of the $1 million prize, arguably the worlds top accolade, will be announced in Oslo on Oct. 9 from a field of 318 candidates. The prize can be split up to three ways.

The Swedish 17-year-old was nominated by three Norwegian lawmakers and two Swedish parliamentarians and if she wins, she would receive it at the same age as Pakistans Malala Yousafzai, the youngest Nobel laureate thus far.

Asle Sveen, a historian and author of several books about the prize, said Thunberg would be a strong candidate for this years award, her second nomination in as many years, with the U.S. West Coast wildfires and rising temperatures in the Arctic leaving people in no doubt about global warming.

Not a single person has done more to get the world to focus on climate change than her, Sveen told Reuters.

The committee has given the prize to environmentalists before, starting with Kenyas Wangari Maathai in 2004 for her campaign to plant 30 million trees across Africa, and in 2007 to Al Gore and the Intergovernmental Panel on Climate Change.

In the era of the coronavirus crisis, the committee could also choose to highlight the threat of pandemics to peace and security, said Dan Smith, the director of the Stockholm International Peace Research Institute.

There is a relationship between environmental damage and our increasing problem with pandemics and I wonder whether the Nobel Peace Prize Committee might want to highlight that, he told Reuters.

If the committee wanted to highlight this trend, he said, there is obviously the temptation of Greta Thunberg.

The Fridays for Future movement started in 2018 when Thunberg began a school strike in Sweden to push for action on climate. It has since become a global protest.

Thunberg and her father Svante, who sometimes handles media queries for her, did not reply to requests for comment.

Many were sceptical when Greta, as she is often referred to, became the bookmakers favourite to win last years Nobel Peace Prize, especially with regards to her age, but her second nomination could strengthen her chances.

The Irish betting agency Paddy Power has the World Health Organization (WHO) as its favourite at odds of 5/2, followed by Thunberg at 3/1 and New Zealand Prime Minister Jacinda Ardern at 5/1.

Greta is re-nominated, which was the case for Malala. I said Malala was young when she was nominated the first time and I said Greta was young the first time she was nominated, Sveen said.

Yousafzai won in 2014.

Other known candidates included the people of Hong Kong, NATO, Julian Assange, Chelsea Manning and Edward Snowden and jailed Saudi activist Loujain al-Hathloul.

Other possible choices are Reporters Without Borders, Angela Merkel and the WHO, experts said, though it is unclear whether they are nominated.

Nominations are secret for 50 years but those who nominate can choose to publicise their choices. Thousands of people are eligible to nominate, including members of parliaments and governments, university professors and past laureates.

It is not known whether Donald Trump is nominated for this years prize, though he is up for next years award after a Norwegian lawmaker named the U.S. President for helping broker a deal between Israel and the United Arab Emirates.

He is unlikely to win, Sveen and Smith agreed, not least for his dismantling of the international treaties to limit the proliferation of nuclear weapons, a cause dear to Nobel committees.

He is divisive and seems to not take a clear stance against the violence the right-wing perpetrates in the U.S., said Smith.

See the original post:
A Nobel for Thunberg? In the age of climate change and virus, it is possible - Reuters